Cybersecurity

VPN Cybersecurity Best Practices in Light of COVID-19

Given the increase in remote work due to the Coronavirus disease, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency is urging organizations to adopt heightened best practice cybersecurity for enterprise virtual private network (VPN) solutions. VPNs provide secure ...

Password Safety and Other Cybersecurity Measures for Your Business

As a leader or executive in your business, it is your job to prepare for the worst-case scenario and then take steps to prevent it. Most businesses rarely consider the real threat that cyberhacking poses to their company, clients, and ...

Malware Attacks

Malware, or malicious software, is written to cause harm to devices like your computer or smartphone. It can also be programmed to steal personal data or disrupt how your computer system works. It’s frustrating, it’s annoying, and it is much ...

Network Security and Data Breaches: No One Is Safe

Network security and data breaches are a real concern for business owners, no matter the size of the company. Major corporations have been compromised in the past decade, including Target and Equifax. Smaller corporations are targeted and compromised on a ...

How Cyberhacking Can Affect Your Business

You have likely heard the news reports of major security breaches and cyberhacking incidents affecting major corporations like Target, Equifax, and Yahoo. You may have even been personally affected by one of these security breaches. Cyberhacking, or breaking into computer ...

How to Stop Google From Tracking You, Even When Your Location History Is Set to “Off”

I bet you thought Google stopped tracking your location once you turned off “Location History” in your account settings. Well, if you did, you were wrong. According to an AP News investigation published Monday, even if you disable Location History, ...

Top 5 Mobile Security Tips for 2019

By Jeff Reiter   I conduct a cybersecurity presentation regularly with business audiences and give back some tips that we all can use to step up our awareness and protection from cyber threats. Despite the business audience focus, smartphones are ...

Contact

RWK IT ServicesRWK IT Services Logo $$$